Profile image of Lei Pan

Dr Lei Pan

STAFF PROFILE

Position

Senior Lecturer in Cyber Security

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

l.pan@deakin.edu.au
+61 3 925 17483

Publications

Filter by

2019

Efficient quantum private queries based on quantum key distribution with pulse-position modulation

Hong Lai, Mingxing Luo, Yongjian Xu, Josef Pieprzyk, Lei Pan, Jun Zhang, Mehmet Orgun

(2019), Vol. 29, pp. 1-7, Laser physics, Bristol, Eng., C1

journal

Predicting the impact of android malicious samples via machine learning

Junyang Qiu, Wei Luo, Lei Pan, Yonghang Tai, Jun Zhang, Yang Xiang

(2019), pp. 1-14, IEEE Access, Piscataway, N.J., C1

journal

A literature review of inter-enterprise SOA in small and medium business communities

A Andriyanto, R Doss, L Pan, P Yustianto

(2019), pp. 547-554, ICITSI 2018 : Proceedings of the 5th International Conference on Information Technology Systems and Innovation, Bandung and Padang, Indonesia, E1

conference

Protean authentication scheme - a time-bound dynamic KeyGen authentication technique for IoT edge nodes in outdoor deployments

Shiju Sathyadevan, K Achuthan, Robin Ram Mohan Doss, Lei Pan

(2019), Vol. 7, pp. 92419-92435, IEEE access, Piscataway, N.J., C1

journal

Automatic extraction and integration of behavioural indicators of malware for protection of cyber-physical networks

S Huda, J Abawajy, B Al-Rubaie, L Pan, M Hassan

(2019), Vol. 101, pp. 1247-1258, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Multiple energy harvesting devices enabled joint computation offloading and dynamic resource allocation for mobile-edge computing systems

Wei Du, Qiwang Lei, Qiang He, Wei Liu, Feifei Chen, Lei Pan, Tao Lei, Hailiang Zhao

(2019), pp. 154-158, ICWS 2019 : Proceedings of the IEEE International Conference on Web Services, Milan, Italy, E1

conference

Cyber security insights into self-proclaimed virtual world hackers

Nicholas Patterson, M Hobbs, F Jiang, L Pan

(2019), pp. 73-87, CSITEC 2019 : Proceedings of the 5th International Conference on Computer Science, Information Technology, Vienna, Austria, E1

conference

A Visualization-Based Analysis on Classifying Android Malware

R Coulter, L Pan, J Zhang, Y Xiang

(2019), Vol. 11806, pp. 304-319, Machine Learning for Cyber Security, Xi'an, China, E1

conference

Data-Driven Android Malware Intelligence: A Survey

J Qiu, S Nepal, W Luo, L Pan, Y Tai, J Zhang, Y Xiang

(2019), Vol. 11806, pp. 183-202, Machine Learning for Cyber Security, Xi?an, China, E1

conference

A3CM: automatic capability annotation for android malware

Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yu Wang, Yang Xiang

(2019), Vol. 7, pp. 147156-147168, IEEE Access, Piscataway, N.J., C1

journal

Data-driven cyber security in perspective-intelligent traffic analysis

Rory Coulter, Qing-Long Han, Lei Pan, Jun Zhang, Yang Xiang

(2019), pp. 1-13, IEEE Transactions on Cybernetics, Piscataway, N.J., C1

journal
2018

Comprehensive analysis of network traffic data

Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang

(2018), Vol. 30, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal

Intelligent agents defending for an IoT world: a review

R Coulter, L Pan

(2018), Vol. 73, pp. 439-458, Computers and security, Amsterdam, The Netherlands, C1

journal

Privacy protection in interactive content based image retrieval

Y Huang, J Zhang, L Pan, Y Xiang

(2018), pp. 1-13, IEEE transactions on dependable and secure computing, Piscataway, N.J., C1

journal

Cross-project transfer representation learning for vulnerable function discovery

G Lin, J Zhang, W Luo, L Pan, Y Xiang, O De Vel, P Montague

(2018), Vol. 14, pp. 3289-3297, IEEE transactions on industrial informatics, Piscataway, N.J., C1

journal

Big network traffic data visualization

Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang

(2018), Vol. 77, pp. 11459-11487, Multimedia tools and applications, New York, N.Y., C1

journal

Distributed detection of zero-day network traffic flows

Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang

(2018), Vol. 845, pp. 173-191, AusDM 2017 : Proceedings of the 15th Australasian Data Mining Conference 2017, Melbourne, Vic., E1

conference

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space

H Lai, M Luo, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 61, pp. 1-11, Science China information sciences, Berlin, Germany, C1

journal

Honeypot frameworks and their applications: a new framework

Chee Ng, Lei Pan, Y Xiang

(2018), Singapore, A1

book

Identifying items for moderation in a peer assessment framework

S James, E Lanham, V mak, L Pan, T Wilkin, G Wood-bradley

(2018), Vol. 162, pp. 211-219, Knowledge-based systems, Amsterdam, The Netherlands, C1

journal

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement

H Lai, M Luo, J Zhang, J Pieprzyk, L Pan, M Orgun

(2018), Vol. 17, pp. 1-11, Quantum information processing, New York, N.Y., C1

journal

Exploring feature coupling and model coupling for image source identification

Y Huang, L Cao, J Zhang, L Pan, Y Liu

(2018), Vol. 13, pp. 3108-3121, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Identifying drawbacks in malicious PDF detectors

A Falah, L Pan, M Abdelrazek, R Doss

(2018), Vol. 878, pp. 128-139, FNSS 2018 : Proceedings of the Future Network Systems and Security Conference 2018, Paris, France, E1

conference

Object localisation through clustering unreliable ultrasonic range sensors

L Pan, X Zheng, P Kolar, S Bangay

(2018), Vol. 27, pp. 268-280, International journal of sensor networks, Olney, Eng., C1

journal

Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing

H Lai, M Luo, Y Xiu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 15, Laser physics letters, Bristol, Eng., C1

journal

A quantum secret sharing scheme using orbital angular momentum onto multiple spin states based on Fibonacci compression encoding

H Lai, M Luo, Y Xu, J Pieprzyk, J Zhang, L Pan, M Orgun

(2018), Vol. 70, pp. 384-390, Communications in theoretical physics, Bristol, Eng., C1

journal

Practical overview of security issues in wireless sensor network applications

H Radhappa, L Pan, J Xi Zheng, S Wen

(2018), Vol. 40, pp. 202-213, International journal of computers and applications, Abingdon, Eng., C1

journal

Keep calm and know where to focus: measuring and predicting the impact of Android Malware

J Qiu, W Luo, S Nepal, J Zhang, Y Xiang, L Pan

(2018), Vol. 11323, pp. 238-254, ADMA 2018: Proceedings of the 14th International Conference on Advanced Data Mining and Applications, Nanjing, China, E1

conference

A quantitative approach to design special purpose systems to measure hacking skills

Ahmed Falah, Lei Pan, F Chen

(2018), pp. 54-61, TALE 2018 : Engineering next-generation learning : Proceedings of the 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering, Wollongong, N.S.W., E1

conference

A scalable and efficient PKI based authentication protocol for VANETs

M Asghar, R Doss, L Pan

(2018), pp. 1-3, ITNAC 2018 : Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference, Sydney, N.S.W., E1

conference
2017

Visual representation of penetration testing actions and skills in a technical tree model

A Falah, L Pan, M Abdelrazek

(2017), pp. 1-10, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Vic., E1

conference

Security analysis of modern mission critical android mobile applications

X zheng, L Pan, E Yilmaz

(2017), pp. 1-9, ACSW 2017 : Proceedings of the Australasian Computer Science Week Multiconference, Geelong, Victoria, E1

conference

Fast and simple high-capacity quantum cryptography with error detection

H Lai, M-X Luo, J Pieprzyk, J Zhang, L Pan, S Li, M Orgun

(2017), Vol. 7, pp. 1-11, Scientific reports, London, Eng., C1

journal

Comprehensive analysis of network traffic data

Y Miao, Z ruan, L Pan, J Zhang, Y Xiang, Y Wang

(2017), pp. 423-430, CIT 2016 : Proceedings of the IEEE International Conference on Computer and Information Technology, Nadi, Fiji, E1

conference

Portguard - An authentication tool for securing ports in an IoT gateway

S Sathyadevan, V Vejesh, R Doss, L Pan

(2017), pp. 624-629, PerCom 2017 : IEEE International Conference on Pervasive Computing and Communications Workshops, Kona, Hawaii, E1

conference

Visualization of big data security - a case study on the KDD99 cup data set

Z Ruan, Y Miao, L Pan, N Patterson, J Zhang

(2017), Vol. 3, pp. 250-259, Digital communications and networks, Amsterdam, The Netherlands, C1

journal

Online peer marking with aggregation functions

S James, L Pan, T Wilkin, L Yin

(2017), pp. 1-6, FUZZ-IEEE 2017 : IEEE International Conference on Fuzzy Systems, Naples, Italy, E1

conference

Cyber security attacks to modern vehicular systems

L Pan, X Zheng, H Chen, H Luan, H Bootwala, L Batten

(2017), Vol. 36, pp. 90-100, Journal of information security and applications, Amsterdam, The Netherlands, C1

journal

Noise-resistant statistical traffic classification

B Wang, J Zhang, Z Zhang, L Pan, Y Xiang, D Xia

(2017), pp. 1-13, IEEE transactions on big data, Piscataway, N.J., C1

journal

A testbed for security analysis of modern vehicle systems

X Zheng, L Pan, H Chen, R Di Pietro, L Batten

(2017), pp. 1090-1095, trustcom/BigDataSE/ICESS 2017 : Proceedings of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1

conference

Security test MOODLE: a penetration testing case study

A Mudiyanselage, L Pan

(2017), pp. 1-12, International journal of computers and applications, Abingdon, Eng., C1

journal

Generating security questions for better protection of user privacy

A Anvari, L Pan, X Zheng

(2017), International Journal of Computers and Applications, Anaheim, Calif., C1

journal
2016

Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding

H Lai, J Zhang, M-X Luo, L Pan, J Pieprzyk, F Xiao, M Orgun

(2016), Vol. 6, pp. 1-12, Scientific reports, London, Eng., C1

journal

Investigating security vulnerabilities in modern vehicle systems

X Zheng, L Pan, H Chen, P Wang

(2016), Vol. 651, pp. 29-40, ATIS 2016 : Proceedings of the International Conference on Applications and Techniques in Information Security, Cairns, Queensland, E1

conference

Robustness and embedding capacity enhancement in time-spread echo-based audio watermarking

I Natgunanathan, Y Xiang, L Pan, P Chen, D Peng

(2016), pp. 1536-1541, ICIEA 2016: Proceedings of the IEEE 11th Conference on Industrial Electronics and Applications, Hefei, China, E1

conference
2015

Segregation-of-duties conflicts in the insider threat landscape: an overview and case study

S Ballesteros, L Pan, L Batten, G Li

(2015), pp. 367-370, ERMM 2015: Proceedings of the 2015 International Conference on Education Reform and Modern Management, Hong Kong, E1

conference

The usefulness metrics of the most popular eReader used by higher education students

D Sari, E Lanham, L Pan

(2015), Vol. 12, pp. 203-212, Issues in informing science and information technology, Santa Rosa, Cailf., C1

journal

Enhanced Twitter sentiment analysis by using feature selection and combination

A Yang, J Zhang, L Pan, Y Xiang

(2015), pp. 52-57, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference
2014

Investigating Facebook groups through a random graph model

D Pallegedara, L Pan

(2014), Vol. 9, pp. 25-34, Journal of multimedia, Finland, C1

journal

Generating repudiable, memorizable and privacy preserving security questions using the Propp Theory of Narrative

L Pan, S Bangay

(2014), pp. 66-72, CyberC 2014 : The 6th International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, E1

conference

A novel method for detecting double compressed Facebook JPEG images

C Ng, L Pan, Y Xiang

(2014), Vol. 490, pp. 191-198, Communications in Computer and Information Science, Dordrecht , Germany, B1

chapter

Privacy preserving in location data release: A differential privacy approach

P Xiong, T Zhu, L Pan, W Niu, G Li

(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), B1

chapter

Forensic identification of students outsourcing assignment projects from freelancer.com

M Monnik, L Pan

(2014), Vol. 490, pp. 183-190, Communications in Computer and Information Science, Berlin, Germany, B1

chapter

Privacy preserving collaborative filtering for KNN attack resisting

T Zhu, G Li, L Pan, Y Ren, W Zhou

(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1

journal
2013

Developing a cloud computing based approach for forensic analysis using OCR

M Trojahn, L Pan, F Schmidt

(2013), pp. 59-68, Proceedings - 7th International Conference on IT Security Incident Management and IT Forensics, IMF 2013, E1

conference

Developing an empirical algorithm for protecting text-based captchas against segmentation attacks

L Pan, Y Zhou

(2013), pp. 636-643, Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013, E1

conference
2012

Using hypothesis generation in event profiling for digital forensic investigations

L Pan, N Khan, L Batten

(2012), pp. 76-86, WDFIA 2012 : Proceedings of the Seventh International Workshop on Digital Forensics & Incident Analysis:, Crete, Greece, E1

conference

Detecting SMS-based control commands in a Botnet from infected android devices

A Nguyen, L Pan

(2012), pp. 23-27, ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop, Melbourne, Vic., E1

conference

Towards a sustainable assessment strategy for digital forensic education and training

L Pan, D Hutchinson, N Khan

(2012), TALE 2012 : Proceedings of the IEEE International Conference on Teaching, Assessment and Learning for Engineering, Hong Kong, E1

conference

Hypothesis generation and testing in event profiling for digital forensic investigations

L Batten, L Pan, N Khan

(2012), Vol. 4, pp. 1-14, International journal of digital crime and forensics, Hershey, Pa., C1

journal
2011

Image source detection : a case study on Facebook images taken by iPhones

L Pan, N Trepanic

(2011), pp. 39-46, ATIS 2011 : Workshop proceedingof ATIS 2011. Melbourne, November 9th, 2011. Second Applications and Techniques in Information Security Workshop, Melbourne, Vic., E1

conference

A Grobner-Shirshov algorithm for applications in internet security

A Kelarev, J Yearwood, P Watters, X Wu, L Ma, J Abawajy, L Pan

(2011), Vol. 35, pp. 807-820, Southeast Asian bulletin of mathematics, Hong Kong, C1

journal
2010

Internet security applications of the Munn rings

A Kelarev, J Yearwood, P Watters, X Wu, J Abawajy, L Pan

(2010), Vol. 81, pp. 162-171, Semigroup Forum, C1

journal

Dynamic addressing in wireless sensor networks without location awareness

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2010), Vol. 26, pp. 443-460, Journal of information science and engineering, Taipei, Taiwan, C1

journal

Using relationship-building in event profiling for digital forensic investigations

L Batten, L Pan

(2010), e-Forensics 2010 : Proceedings of the 3rd International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Shangai, China, E1

conference
2009

Robust correctness testing for digital forensic tools

L Pan, L Batten

(2009), pp. 54-64, Forensics in telecommunications, information and multimedia : second international conference, e-Forensics 2009, Adelaide, Australia, January 19-21, 2009 : revised selected papers, Berlin, Germany, E1

conference

Robust performance testing for digital forensic tools

L Pan, L Batten

(2009), Vol. 6, pp. 71-81, Digital investigation, Kidlington, England, C1

journal
2008

Teaching digital forensics to undergraduate students

L Batten, L Pan

(2008), Vol. 6, pp. 54-56, IEEE Security and Privacy, C1

journal

Measure of integrity leakage in live forensic context

L Pan, A Savoldi, P Gubian, L Batten

(2008), pp. 534-537, IIH-MSP 2008 : Proceedings of the Intelligent Information Hiding and Multimedia Signal Processing 2008 international conference, Harbin, China, E1-1

conference
2007

A lower bound on effective performance testing for digital forensic tools

L Pan, L Batten

(2007), pp. 117-130, SADFE 2007 : Second International Workshop on Systematic Approaches to Digital Forensic Engineering : proceedings : 10-12 April 2007, Seattle, Washington, USA, Seattle, Washington, E1

conference

An effective and efficient testing methodology for correctness testing for file recovery tools

L Pan, L Batten

(2007), pp. 103-107, IIHMSP 2007 : Third International conference on Intelligent Information Hiding and Multimedia Signal Processing : proceedings : 26-28 November, 2007, Kaohsiung, Taiwan, Kaohsiung, Taiwan, E1

conference
2006

Lease based addressing for event-driven wireless sensor networks

R Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 251-256, ISCC 2006 proceedings : 11th IEEE Symposium on Computers and Communications : 26-29 June 2006, Cagliari, Sardinia, Italy, Cagliari, Sardinia, Italy, E1

conference

Address reuse in wireless sensor networks

R Chellappa Doss, D Chandra, L Pan, W Zhou, M Chowdhury

(2006), pp. 329-333, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference

A case for cross layer design: the impact of physical layer properties on routing protocol performance in MANETs

R Doss, L Pan

(2006), pp. 409-413, ATNAC, Australian Telecommuncation Networks and Applications Conference, 2006., Melbourne, Australia, E1

conference
2005

Reproducibility of digital evidence in forensic investigations

L Pan, L Batten

(2005), pp. 1-8, DFRWS 2005 : Proceedings of the 5th Annual Digital Forensic Research Workshop, New Orleans, La., E1

conference

Funded Projects at Deakin

Other Public Sector Funding

Cyber-Safe Connected Vehicles: Ensuring Secure, Trusted, and Robust Cooperative Automotive systems.

Prof Robin Ram Mohan Doss, Prof Seng Loke, Dr Lei Pan, Dr Rolando Trujillo Rasua, Dr Frank Jiang, Dr Leo Zhang

  • 2019: $296,940

Industry and Other Funding

Implementation of transaction privacy protocols on Distributed Ledger systems.

Dr Lei Pan

  • 2019: $14,500

Supervisions

Principal Supervisor
2019

Chee Keong (Allan) Ng

Thesis entitled: VoterChoice: A Ransomware Detection Honeypot with Multiple Voting Concept

Doctor of Philosophy (Information Technology), School of Information Technology

Associate Supervisor
2019

Russul Dh. Abdul Jabar Al-Anni

Thesis entitled: Cancer Prognosis Based on Knowledge Discovery from Clinic and Biological Data Sets

Doctor of Philosophy (Information Technology), School of Information Technology

2018

Purnomo Yustianto

Thesis entitled: General Framework for Service Engineering Analysis and Design

Doctor of Philosophy (Information Technology), School of Information Technology

Ahmed Abdulateef Mohammed

Thesis entitled: Robust Approaches for Face Recognition

Doctor of Philosophy (Information Technology), School of Information Technology

2014

Moutaz Alazab

Thesis entitled: Analysis on Smartphone Devices for Detection and Prevention of Malware

Doctor of Philosophy (Information Technology), School of Information Technology